Splunk ES vs. Elastic (ELK) Stack

Splunk ES vs. Elastic (ELK) Stack

The modern digital and globalized world contributes to the fact that sooner or later, each business will meet Security information and event management systems (SIEM) or some individual elements of systems of this class. Let’s try to understand what it is...
Log4Shell: How to Mitigate Log4j Vulnerability

Log4Shell: How to Mitigate Log4j Vulnerability

In the end of 2021, the whole digital world has suffered the new cybersecurity flaw named Log4Shell. A new vulnerability is considered to be one of the worst that have been discovered during the last years. It scored 10 out of 10 points on the CVSS vulnerability...
3 Key Critical Vulnerabilities and Mitigation Flows of Them

3 Key Critical Vulnerabilities and Mitigation Flows of Them

How to Protect Against LLMNR / NBT-NS Attacks, Zerologon, LLMNR,NTLM RELAY Introduction More and more companies are looking for solutions to minimize risks and increase levels of cybersecurity by disabling or taking preventive actions when Link-Local Multicast...
Cybersecurity as Future for Connected Cars

Cybersecurity as Future for Connected Cars

Human nature possesses both an aspiration to create and an aspiration to destroy. Therefore, when inventing something new, the creator must be prepared for someone who will want to exploit their invention for nefarious gain. As we apply this to the burgeoning...
Cookie theft consequences. How to protect the iGaming business

Cookie theft consequences. How to protect the iGaming business

Recently, the whole gaming world tensed up. One of the largest gaming companies in the USA and Europe faced a massive cyber security breach—hackers have stolen 780 GB of source code for games (such as FIFA, Medal of Honor, Battlefield) of Electronic Arts (EA), a major...